top of page

Enhancing Law Enforcement Collaboration: Application Leveraging Blockchain For Sharing Extortion Information

Using Zero-Knowledge Proof Blockchain

Cyber extortion, including sextortion, ransomware and digital blackmail, presents significant challenges to law enforcement agencies. These crimes often span multiple jurisdictions, making effective collaboration essential. This project proposes an application that leverages zero-knowledge proof blockchain services to facilitate secure, transparent, and efficient sharing of extortion-related information among law enforcement agencies. This application aims to enhance interagency collaboration, streamline investigations, and ultimately reduce the prevalence of cyber extortion.


Cyber extortion is a growing threat in the digital age.

Ransomware attacks and digital blackmail have become increasingly sophisticated, targeting individuals, businesses, and governments. These crimes are often perpetrated by well-organized groups that operate across borders, making it challenging for law enforcement agencies to track and mitigate these threats effectively. Traditional information-sharing methods are inadequate due to their susceptibility to breaches and inefficiency.

ABOUT US

Resilient Labs

01

Our Story

Resilient Labs was formed to build victim-conscious applications that will solve crimes originating from social media and other tech platforms and apps. 

 

Our name represents the children, friends, and families who have been impacted by social technology crimes and have struggled with their own personal resiliency. It stands for each victims' search to be heard and validated as they take the necessary steps to recover.

02

The Problem

Cyber Extortion
& Sextortion

 

​Cyber-extortion is a form of online crime which occurs when a person uses the Internet to demand money or other goods or behavior (such as sexual exploitation *sextortion), from another person by threatening to inflict harm to their person, their reputation, or their property. There are various forms of cyber-extortion.​​ *www.definitions.uslegal.com/c/cyberextortion

03

Our Solutions

Project Cryptonym

 

Definition of cryptonym: cryp·​to·​nym \ ˈkrip-tə-ˌnim \​ : a secret name

Cryptonym LE Edition (Law Enforcement)

We know usernames are actionable pieces of intelligence that can be investigated and one of the few links to identifying anonymous cybercriminals. This key will allow law enforcement to decrypt their hidden identity.​

Cryptonym SAFE

iOS and Android Dapp for public use. Username SAFE check allows social media users to search 'usernames' (secret names used by offenders/bad actors) on the growing Cryptonym LE blacklist before connecting with unknown users. 

04

Leadership

"The Vision Architect"

Duane Jacobsen: Founder/Partner (Business/Product Dev.)

 

"The Concept Architect"
Jason Oglesby: Founder/Partner (Law Enforcement)

"The Innovation Architect"

Peter Jamack: Partner (Technology)

"The Tech Compass"

Richard Smondrk: Advisor (Technology)

"The Tactical Titan"

Charles Marino: Advisor (Law Enforcement)

PROJECT CRYPTONYM

Cryptonym

Law Enforcement

Edition

Law Enforcement Edition

Blockchain Technology to Overcome Social Cyber-Extortion

Resilient Labs has established a team of successful experts in blockchain technology, innovative product development and law enforcement to solve law enforcement problems with a novel approach to collaborative criminal investigations.

 

Our research reveals the harsh reality that online sextortion crime spreads across traditional law enforcement jurisdictions, making it more difficult to identify bad actors given readily available evasion methods.

 

Resilient Labs understands that gaining actionable intelligence to investigate online predator accounts is rare and certainly not something most officers have the time or experience in obtaining.

 

”Drawing on my background as a detective specializing in the investigation of online crimes against children, I recognized in 2020 the urgent necessity for an innovative method to track down online predators. I never had a viable option or tool set to search social media profile usernames, deconflict the username with other agencies outside my jurisdiction or collaborate with officers who may be investigating the same suspect outside my jurisdiction. This led to the conception of a secure, collaborative, and globally decentralized application designed to facilitate the sharing of information across jurisdictional boundaries, mindful of restrictions" said Jason Oglesby, co-founder and COO of Resilient Labs and retired detective from the child abuse unit in Canada.

 

“This approach is aimed at enhancing the effectiveness of law enforcement agencies worldwide in safeguarding children from digital threats.”

 

Cryptonym LE allows for the secure collection of known usernames used by cybercriminals. Social media platforms hold actionable pieces of intelligence that law enforcement can investigate and are one of the few links to identifying anonymous cybercriminals. A Cryptonym LE subscription will allow law enforcement to decrypt their hidden identity and change the way sextortion crime investigators manage and solve cases around the world.

SOLUTION

Problem We Solve

Recognizing the significance of blockchain technology managing both user identity and data access transaction management, Resilient Labs has successfully developed an alpha demo version of Cryptonym LE using a public blockchain network. However, Resilient Labs is eager to form a strategic partnership with an entity  associated with Bitcoin.


“We aim to pioneer a community-driven funding initiative that enhances Cryptonym LE subscriptions in local law enforcement districts through the direct participation and contributions  by community members for their respective jurisdictions,” said Duane Jacobsen, co-founder, and CEO of Resilient Labs. “This community-based approach plays a crucial role in providing support to each other and to families or individuals affected by this crime, offering vital assistance in the aftermath. While numerous support organizations exist for sextortion victims, their focus often does not extend to the apprehension and prosecution of the perpetrators.”


Cryptonym LE is a decentralized application (DApp), solution that connects securely across services within this uniquely architected ecosystem. “Decentralization facilitates private, trustless computation on encrypted data, allowing our graph database to seamlessly map data connections within the vector database and efficiently fingerprint social media data.” said Peter Jamack, Resilient Labs CTO. “Powered by generative AI, this tool transforms data into actionable insights, enhancing risk mitigation and security through zero-knowledge proof blockchain services. This technology stack enables advanced DApp functionality to scale across the ecosystem.”

FAQ

Your questions, answered

Get
in Touch

bottom of page